Patent | Date |
---|
Systems and methods for detecting potentially malicious content in decentralized machine-learning model updates Grant 11,361,100 - Gates , et al. June 14, 2 | 2022-06-14 |
Systems and methods for verifying decentralized federated data using influence evaluation Grant 11,227,050 - Gates , et al. January 18, 2 | 2022-01-18 |
Discovery of computer system incidents to be remediated based on correlation between support interaction data and computer system telemetry data Grant 11,163,875 - Roundy , et al. November 2, 2 | 2021-11-02 |
Systems and methods for assuring authenticity of electronic sensor data Grant 11,128,473 - Kats , et al. September 21, 2 | 2021-09-21 |
Estimating asset sensitivity using information associated with users Grant 10,984,322 - Chari , et al. April 20, 2 | 2021-04-20 |
Estimating asset sensitivity using information associated with users Grant 10,984,323 - Chari , et al. April 20, 2 | 2021-04-20 |
Efficient incident response through tree-based visualizations of hierarchical clustering Grant 10,877,946 - Silva , et al. December 29, 2 | 2020-12-29 |
Systems and methods for evaluating unfamiliar executables Grant 10,678,917 - Witten , et al. | 2020-06-09 |
Securing a network device by automatically identifying files belonging to an application Grant 10,579,794 - Gates , et al. | 2020-03-03 |
Encrypting and decrypting sensitive files on a network device Grant 10,534,933 - Roundy , et al. Ja | 2020-01-14 |
Systems and methods for making security-related predictions Grant 10,313,379 - Han , et al. | 2019-06-04 |
Systems and methods for dynamically validating remote requests within enterprise networks Grant 10,284,564 - Roundy , et al. | 2019-05-07 |
Security recommendations based on incidents of malware Grant 10,262,137 - Hart , et al. | 2019-04-16 |
Systems and methods for dynamically validating remote requests within enterprise networks Grant 10,200,369 - Roundy , et al. Fe | 2019-02-05 |
Systems and methods for automated whitelisting of files Grant 10,200,395 - Roundy , et al. Fe | 2019-02-05 |
Systems and methods for identifying non-malicious files on computing devices within organizations Grant 10,169,584 - Roundy , et al. J | 2019-01-01 |
Systems and methods for whitelisting file clusters in connection with trusted software packages Grant 10,089,469 - Roundy , et al. October 2, 2 | 2018-10-02 |
Systems and methods for identifying suspicious singleton files using correlational predictors Grant 10,073,983 - Li , et al. September 11, 2 | 2018-09-11 |
Systems and methods for determining the trustworthiness of files within organizations Grant 10,055,586 - Roundy , et al. August 21, 2 | 2018-08-21 |
Systems and methods for profiling client systems Grant 10,057,274 - Roundy , et al. August 21, 2 | 2018-08-21 |
Practical and dynamic approach to enterprise hardening Grant 10,025,937 - Kashyap , et al. July 17, 2 | 2018-07-17 |
Systems and methods for detecting security threats Grant 10,003,606 - Roundy , et al. June 19, 2 | 2018-06-19 |
Systems and methods for predicting security threats Grant 9,998,480 - Gates , et al. June 12, 2 | 2018-06-12 |
Systems and methods for identifying potentially malicious singleton files Grant 9,959,407 - Li , et al. May 1, 2 | 2018-05-01 |
Systems and methods for predicting security threat attacks Grant 9,948,663 - Wang , et al. April 17, 2 | 2018-04-17 |
Systems and methods for curating file clusters for security analyses Grant 9,842,219 - Gates , et al. December 12, 2 | 2017-12-12 |
Systems and methods for dynamic access control over shared resources Grant 9,807,094 - Liu , et al. October 31, 2 | 2017-10-31 |
Systems and methods for file classification Grant 9,805,192 - Gates , et al. October 31, 2 | 2017-10-31 |
Systems and methods for creating security profiles Grant 9,798,876 - Parker-Wood , et al. October 24, 2 | 2017-10-24 |
Systems and methods for threat detection using a software program update profile Grant 9,800,590 - Gates , et al. October 24, 2 | 2017-10-24 |
Systems And Methods For Detecting Security Threats App 20170289178 - Roundy; Kevin Alejandro ;   et al. | 2017-10-05 |
Inferring security policies from semantic attributes Grant 9,769,208 - Chari , et al. September 19, 2 | 2017-09-19 |
Estimating data topics of computers using external text content and usage information of the users Grant 9,600,576 - Gates , et al. March 21, 2 | 2017-03-21 |
Estimating data topics of computers using external text content and usage information of the users Grant 9,600,577 - Gates , et al. March 21, 2 | 2017-03-21 |
Inferring Security Policies from Semantic Attributes App 20160352778 - Chari; Suresh N. ;   et al. | 2016-12-01 |
Estimating Data Topics Of Computers Using External Text Content And Usage Information Of The Users App 20150039617 - Gates; Christopher ;   et al. | 2015-02-05 |
Estimating Data Topics Of Computers Using External Text Content And Usage Information Of The Users App 20150039618 - Gates; Christopher ;   et al. | 2015-02-05 |
Estimating Asset Sensitivity Using Information Associated With Users App 20140304199 - Chari; Suresh N. ;   et al. | 2014-10-09 |
Estimating Asset Sensitivity Using Information Associated With Users App 20140304821 - Chari; Suresh N. ;   et al. | 2014-10-09 |
Solar powered water fountain Grant 6,179,218 - Gates January 30, 2 | 2001-01-30 |
Cover for a bird feeder Grant D373,660 - Gates September 10, 1 | 1996-09-10 |